My Cloud Journey as an Early Adopter

Ever heard the saying, “The Cloud is just someone else’s computer”? This is one of the many arguments I encountered as I became an early adopter in 2010. While it is technically true, it misses the point: the inherent flexibility and benefits of the “Cloud” maximize the chances of differentiating your company from its competitors, […]

Read More

Data Storytelling: A Cheat Sheet

Data Storytelling is an essential skill of of any data scientist that makes data come alive. It is a structured method for turning data insights into action through analysis, design, and narrative. It is an art that brings interpretation and clarity while engaging the audience towards action. The Framework below defines the art of data […]

Read More
Information Security Team

InfoSec Can Be Taxing, So Here’s a Taxonomy

Information Security can sometimes feel like death by documentation, like a bunch of red tape just to keep regulators and auditors at bay. Throw in differences in lexicon, and seeing how all the many pieces fit together can be quite difficult. Getting everyone, practitioner and leadership alike, on the same page when it comes to […]

Read More

Privacy and Security: What’s the Difference?

Article Summary: Security controls are put in place to control who can access the information, but privacy controls are for when and what they can access. For example, doctors at a nationwide primary care chain most likely have security access to each patient’s account information across the country, but should only have privacy access when there […]

Read More

What We Learned from MS Azure Bootcamp

The brain power was palpable. We hosted the Global Azure Bootcamp at our space in Richmond, Virginia, and the attendees were ready to tackle some big cloud issues during breakouts and presentations. We asked attendees to fill out a survey about their cloud adoption and implementation journeys, as well as their top challenges. They revealed […]

Read More

Essential Steps to Strengthening Cybersecurity

  Many organizations know they must have the basics: hire a CISO, perform a risk assessment, and find security vendors to fill up the holes. Unfortunately, these are often mere boxes to check. Cathie Brown offers a few simple considerations in each of those steps that will strengthen your cybersecurity posture, like what to look […]

Read More

How I Found Inspiration in Financial Services Deregulation

Values are proven when demonstrated without a mandate to do so. You won’t find a financial services institution that does not have a theme of customer, fairness or integrity woven into its core values. The current industry deregulation trend is a powerful opportunity for financial services firms to show and prove their values, and that […]

Read More

Organizational Risk Management Is Not Just About Compliance

  Organizational risk management is too often treated as a compliance issue with complex rules that result in a back office tracking of risks that don’t see the light of day.  This presentation contrasts a traditional view of organizational risk management with an alternative view provided in a Harvard Business Review article by Robert S. […]

Read More

Presentations at COV Information Security Conference

2018 COV Presentation: NICE and the Cybersecurity Workforce Framework Presenter(s): Dave Zaras and Eddie McAndrew The National Initiative for Cybersecurity Education (NICE) has produced the Cybersecurity Workforce Framework (CWF) with the intent of closing the cybersecurity talent gap. The NICE CWF identifies seven broad categories of security roles which comprise thirty-two specialty areas. Detailed work […]

Read More